ASSA ABLOY discussed the importance of securing the critical infrastructure, the building and beyond, at a media press conference April 15 on the opening day of ISC West 2015 in Las Vegas.
Martin Huddart, president of ASSA ABLOY’s Access and Egress Hardware Group, based in New Haven, Conn., outlined some of the current and future objectives of the company, which continues to fine-tune its global leadership in door opening solutions while playing a significant role in the future of access control technologies.
“Guards and barriers are the first line of defence in access control, and the next layer is doors and frames as well as bullet-resistant doors,” says Martin Huddart, president of ASSA ABLOY’s Access and Egress Hardware Group |
Huddart spoke about the 2013 acquisition of Ameristar while showcasing its recent launch of the Freedom C2 access control point command and control system.
Freedom C2 is a PC-based system developed in response to demand for an integrated and seamless combination of Active Vehicle Barrier Control System (AVBCS), Access Control Point Controls System (ACPCS), Automated Installation Entry (AIE), Perimeter Intrusion Detection System (PIDS), Wrong Way and Over Speed Protection (WW/OS) and support for CCTV/DVR. Freedom C2 puts all of this functionality on a single platform that is easy to use and can stand alone or function as part of a network. Media were treated to an intense video showcasing the capabilities of the Freedom C2 in action—stopping a speeding vehicle dead in its tracks.
“Guards and barriers are the first line of defence in access control, and the next layer is doors and frames as well as bullet-resistant doors,” Huddart said. He added that the Freedom C2 is easy to install and the system is password-protected, with the features accessible to a user determined, controlled and monitored by that user’s login.
Huddart also discussed the importance of doors, frames and securing the perimeter of a facility for total access control. But in addition to the focus on the mainstay of perimeter security, he unveiled new ideas, technologies and products to illustrate how ASSA ABLOY is “reimagining access control.”
Huddart outlined a renewed focus on the growing multi-family market, while announcing a suite of next-generation solutions now available from Yale Locks & Hardware designed for growing multi-family and small business segments called nexTouch™.
nexTouch™ is the next generation of the Yale InTouch access control lock, Yale Real Living™ digital deadbolts, and user-friendly, cloud-based software specifically designed for managing multi-family properties. The small business solution includes the same locks plus integration with burglar alarm systems, such as those from Honeywell and Alarm.com, and with connected home platform solutions such as those offered by Icontrol Networks.
Mobile access trends
In discussing future trends, Huddart said mobile phone access control is at a tipping point. “Hospitality venues like Starwood Resorts are using mobile phones instead of keys. Now users can have their keys on their phones and over the air and the technology is agnostic.”
At ISC West, ASSA ABLOY also unveiled HID Mobile Access® support across a broad range of access control locks from ASSA ABLOY Group brands Corbin Russwin and SARGENT. This enables the ability to use phones and other mobile devices enabled with Bluetooth® Smart and NFC credentials with the IN120 WiFi lock, Access 700 and Passport 1000 PoE and WiFi locks and the SE LP10 Integrated Wiegand lock.
HID Mobile Access "powered by Seos" provides an easy, intuitive solution for issuing, delivering and revoking digital credentials on iOS and Android mobile phones and tablets with Bluetooth Smart and/or NFC technology. Offering comprehensive security, it protects identity data and keeps over-the-air communications between mobile devices and locks private.
“Seos is like having a magic key chain, and you don’t have to fool around with keys -- it’s all in the phone. Mobile-enabled locks allow customers to extend the convenience and security of mobile access to a wider variety of applications, while maintaining interoperability with their existing credential base.”